>What is the output of the following code:

list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]
print (list1[1] )

Answers

Answer 1

Answer:

Given code output is "786".

Explanation:

Code:

list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]#defining a list list1 that holds value in parameter

print (list1[1] )#use a print method that prints list index value

In the given code a list "list1" is declared that holds value in it and in the next step a print method is declared that prints the first index value of the list.

>What Is The Output Of The Following Code:list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]print (list1[1]

Related Questions

Your company resides in an area with rapid growth in both the corporate and residential areas surrounding your office. As such, your company has been experiencing several brownouts due to power grid problems (too much demand and not enough electricity). Fearing that your computers (especially the servers) could be damaged by these brownouts, your manager has asked you to find a solution to this problem.
Which of the following would be the BEST device to recommend to your manager for computer protection?
A. Surge suppressor
B. Power strips
C. UPS
D. Wall Outlet

Answers

Answer:

The correct answer is option C (UPS).

Explanation:

Since brownouts are reduced voltages that might not be good enough for the required electricity capacity for your company, fearing that your computers (especially the servers) could be damaged, it is best to use UPS for your computer protection.

A UPS also called (Uninterruptable Power Supply) can function as a Surge suppressor when the voltages entering your company might be higher than normal, it can also function too in protecting your computers (especially the servers) in the case of a brownout when voltage required by your computers dropped below the required level. In the case of a brownout, the  UPS supplies energy stored in its batteries to make the computers keep working without going off from lack of electricity.

Are DoS and DDos tactics appropriate for legitimate organizations to use against others? What fallout is considered appropriate fallout should an attack be used on others? Explain your answer.

Answers

Answer:

They are inappropriate

fallouts: Access denial and data theft

Explanation:

Dos ( denial of service ) and DDos ( distributed denial of service ) are inappropriate for legitimate organizations to use against each other. because DOS or DDos attacks are attacks on the server of an organization by sending an unusual amount of traffic to the server, thereby denying the devices and users connected to the server access to the server.

Access denial and data theft are the fallouts associated with DOS  and DDos attacks

Select the correct answer.

Susan is a programmer and uses the hexadecimal number system to represent instructions. Which letters of the alphabet do you think Susan uses to represent the numbers 10 to 15 in this number system?

A. A to F

B. A to H

C. A to M

D. A to J

Answers

Answer is  Hexadecimal  :     A.   A to F

complete the sentence: hexadecimal numbers use base ____

Answers

Hexadecimal numbers use base-16

Being a Base-16 system, the hexadecimal numbering system therefore uses 16 (sixteen) different digits with a combination of numbers from 0 through to 15. In other words, there are 16 possible digit symbols.

what is the difference between coding with html and coding with python

Answers

Answer:

Python is an object-oriented programming language that is designed to be accessible and simple for all users, HTML is a web language and is used globally to define the structure of web pages by using various tags. HTML is not a programming language it's a markup language which is used to formatting web pages. Python is a general purpose scripting language which can be used to develop a wide range of programs.

A car manufacturer uses'simulation software during the design process for a new car. Which of the
following are reasons to use simulation software in this context?
1. Using simulation software can save the company money by helping to compare designs early in
the process, before prototype cars are built.
II. Using simulation software can help to identify safety issues by providing data about how different
mechanical components will interact in a wide variety of situations.
III. The manufacturer can present simulation software to customers to demonstrate different design
possibilities
А
I and II only
B
I and III only
С
II and III only
D
I, II, and III

Answers

D I,II and III is the answer i think

The reasons to use simulation software in this context are I, II, and III. The correct option is D.

What is simulation software?

The process of simulating a genuine phenomenon with a set of mathematical formulas is the foundation of simulation software. It is essentially a program that allows the user to simulate an operation and view it without really conducting it.

Simulation is a decision-making and decision-support tool. You can use simulation software to assess, compare, and optimize different designs, programs, and policies. As such, it can be used to explain and defend decisions to multiple stakeholders.

By allowing the corporation to evaluate concepts early in the process before prototype automobiles are constructed, simulation software can save the company money.

Therefore, the correct option is D, I, II, and III.

To learn more about simulation software, refer to the link:

https://brainly.com/question/16192324

#SPJ2

Describe how serial data access finds data

Answers

Answer:

Serial data access will go through all the data by order until the target data is reached

Explanation:

This is opposite of direct data access which immediately finds the desired

data

Answer:

Serial access works by accessing the data at the beginning and then working through it bit-by-bit until the end.

...

Examples of storage medium that use serial access are:

Video cassettes.

Music cassettes.

Backup tape cartridges(hold lots of tape for backing up large amounts of data)

For what purpose do the hackers create the zombies army?

A. DDoS Attacks
B. DoS Attacks
C. Warm Attacks

Answers

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone

(101101+10110) /110
101101-11001/101 please I need help

Answers

Answer:

000000000000000000000000000001111111111111111111


1.can you identify the materials needed in making simple doorbell ???

2.what is the use of each material or tool needed in making simple doorbell?????

pakianswer po ng maayos​

Answers

Answer:

1. rotary tool, spray paint, light, drill,

Explanation:

What is the Full form of DC?

Answers

Answer:

Deputy Commissioner.

Answer:

the full form of DC is deputy commissioner

State two pieces of information that need to be labeled on the idea development sketch. 1 .________________________________________________. 2 .___________________________________________.​

Answers

Answer:

Design drawings should show details on layout, measurements, plan, cross-sectional and vertical profiles. This information is prepared as scale drawings of the works to be constructed. they are legible  they include all information from previous revisions and updates.

Explanation:

In cell K2 enter a formula using the IF and OR functions, as well as structured references, to determine if Adam Moriarty can be a group leader. a. The IF function should first determine if the staff member’s Service Years is greater than 3 OR if the staff member’s college graduate status is "Yes". Remember to use a structured reference to the Service Years and the College Graduate columns.

Answers

Solution :

The value of the K2 cell is filled by IF and OR functions with structured references as :

[tex]K2=IF(OR([CBF\ \text{Staff[ Service years]} > 3, \text{CBF Staff[College graduate]}="Yes"),"Yes","No")[/tex]

Now if the syntax of the formula is not provided, then we can use :

[tex]$K2=IF(OR([[\text{Service Years}]]>3,[[\text{College Graduate}]]="Yes"),"Yes","No")$[/tex]

The staff member are required to satisfy one of the two or both the conditions so as to become a group leader. The conditions are :

---   staff member should served for more than 3 years

--- staff members should be college graduate

Write a pseudocode to calculate the factorial of a number

Answers

Answer:

Answer CODE from C# Sharp  Language

Explanation:

using System;

namespace test

{

   class Program

   {

       public void silnia()

       {

           decimal liczba;

           decimal silnia = 1;

           Console.WriteLine("Obliczanie Silni ");

           Console.WriteLine("Podaj liczbę: ");

           liczba = Convert.ToInt32(System.Console.ReadLine());

           //liczba = int.Parse(Console.ReadLine());

           for (int i = 1; i <= liczba; i++)

               silnia *= i;

           Console.WriteLine("Wynik Silni Wynosi :  " +silnia +" \n ");

       }

       static Program ćwiczeniaA;

       static void Main(string[] args)

       {

           ćwiczeniaA = new Program();

           ćwiczeniaA.silnia();

       

           Console.WriteLine("Koniec Programu");

           System.Console.ReadLine();

       }                                

   }

}

Can someone please type a code that makes a house in python and turtle graphics i need help

Answers

Answer:

import turtle  

turtle.speed(2)

#shape

turtle.forward(100)

turtle.left(90)

turtle.forward(100)

turtle.left(45)

turtle.forward(100)

turtle.left(90)

turtle.forward(100)

turtle.left(45)

turtle.forward(100)

turtle.left(90)

turtle.forward(100)

#door

turtle.left(90)

turtle.forward(50)

turtle.left(90)

turtle.forward(25)

turtle.left(90)

turtle.forward(50)

#windows

turtle.penup()

turtle.right(90)

turtle.forward(20)

turtle.right(90)

turtle.forward(20)

turtle.pendown()

turtle.forward(25)

turtle.left(90)

turtle.forward(40)

turtle.left(90)

turtle.forward(25)

turtle.left(90)

turtle.forward(40)

Explanation:

here :)

Other Questions
PLS HELP ASAP.!THANK YOU, WILL MARK BRAINLIEST F) Pick out Pronoun and tell the kind. 1. He has written this book himself. 2. Who came late in the class?3. The manager himself checked the taste of the soup.4. This is a present from my uncle.5. These crayons are ours.6. This is the man whose son won the first prize.7. The Principal herself suggested the changes. A student uses the ratio of 4 oranges to 6 fluid ounces tofind the number of oranges needed to make 24 fluidounces of juice. The student writes this proportion:4 24616Explain the error in the student's work. holaaandaaa cuanto es 22+22 The Democratic party platform on which Franklin Roosevelt campaigned for the presidency in 1932 called for a. extensive social reforms and a balanced budget. b. a sixty percent tax on the income of the highest tow percent of American income earners. c. breaking up monopolistic corporations and supporting small business. d. deficit spending and a higher military budget. e. higher tariffs and support for American manufacturers What did the geography of all the first known civilizations have in common? Which of these are themes in the raven? Hannah lost four points on a test and earned four points on an extra credit question what does the sum of 0 mean in the description of this situation? Read the excerpt from Act V, scene iii of Romeo and Juliet.Friar Laurence: Stay not to question, for the watch is coming;Come, go, good Juliet.[Noise again.] I dare no longer stay.Juliet: Go, get thee hence, for I will not away. [Exit FRIAR LAURENCE.]Whats here? a cup, closd in my true loves hand?Poison, I see, hath been his timeless end.O churl! drunk all, and left no friendly dropTo help me after! I will kiss thy lips;Haply, some poison yet doth hang on them,To make me die with a restorative. [Kisses him.]Thy lips are warm!First Watch: [Within.] Lead, boy: which way?Juliet: Yea, noise? then Ill be brief. O happy dagger! [Snatching ROMEOS dagger.]Which phrases from the passage are oxymorons? Select 2 options.true loves handhappy daggergood Julietlips are warmtimeless end The teacher complied ____ our request fill in the blanks Need help on this!! Will give 20 points!!! Find the area of the shape. Which particles are attracted as a result of the electrostatic force?A. Protons and electronsB. Any particles that have massC. Any particles that have like chargesD. Protons and neutrons 1. Explain why food lasts longer when placed in the refrigerator as opposed to on the counter in the kitchen.2. List and describe four factors that affect the rate of a reaction.3. Sketch a potential energy diagram for the following reaction: N2(g)+3H2(g)-->2NH3(g)Use Table I in the Chemistry Reference Table to identify the following on your graph: potential energy of reactants, potential energy of products, activation energy, and heat of reaction. State the value of the enthalpy and whether the reaction is endothermic or exothermic. Label the y-axis and potential energy and x-axis as reaction coordinate.4. Describe and explain the effect of (a) the increase in temperature, (b) the increase in concentration of C2H4, and (c) a decrease in pressure to the following system at equilibrium: 2C + 2H2 + heat C2H4 If i= square root of -1, what is the value of i^3 The weekly amount of money spent on maintenance and repairs by a company was observed, over a long period of time, to be approximately normally distributed with mean $400 and standard deviation $20. How much should be budgeted for weekly repairs and maintenance to provide that the probability the budgeted amount will be exceeded in a given week is only 0.1? GIVING OUT BRAINLIEST HELP PLEASE The hull of a sunken boat, laying on the seabed, is 9 m below the surface of the sea, where the sea water has an average density of 1,025 kg/m3. The hulls surface area is 12 m2. What is the total force exerted by seawater on the hull?Required to answer. Single line text. You are ordering a new home theater system that consists of a TV, surround sound system, and DVD player. You can choose from 66 different TVs, 1212 types of surround sound systems, and 1818 types of DVD players. How many different home theater systems can you build Which expression is equivalent